This patch fixes a possible buffer overrun problem in crypto perf test. Previously when user configured aad size is over 12 bytes the copy of template aad will cause a buffer overrun. The problem is fixed by only copy up to 12 bytes of aad template.
Fixes: 8a5b494a7f99 ("app/test-crypto-perf: add AEAD parameters") Cc: pablo.de.lara.gua...@intel.com Signed-off-by: Przemyslaw Zegan <przemyslawx.ze...@intel.com> --- v3: - replaced hardcoded values by sizeof(aad) app/test-crypto-perf/cperf_test_vectors.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/app/test-crypto-perf/cperf_test_vectors.c b/app/test-crypto-perf/cperf_test_vectors.c index 2c7e314ec8..271e91c13c 100644 --- a/app/test-crypto-perf/cperf_test_vectors.c +++ b/app/test-crypto-perf/cperf_test_vectors.c @@ -555,8 +555,8 @@ cperf_test_vector_get_dummy(struct cperf_options *options) return NULL; } - if(options->aead_aad_sz > 12) - options->aead_aad_sz = 12; + if(options->aead_aad_sz > sizeof(aad)) + options->aead_aad_sz = sizeof(aad); memcpy(t_vec->aad.data, aad, options->aead_aad_sz); t_vec->aad.phys_addr = rte_malloc_virt2iova(t_vec->aad.data); -- 2.30.2